Certification program



Windows Exploitation

Acquire the industry required skills and insure a robust career in the domain of cyber security.

Advanced Windows Exploitation & Penetration Test

Master Cyber Security Skills

Learn from the expert & experienced cyber security researchers and trainers. Gain in-depth, practical knowledge & master your cyber security skills.

Showcase your expertise

Take a certification exam and get your skills and expertise recognize with a certificate from hacker guru.

Gain practical experience

30+ Labs will introduce you with real life security issues and will give you in-depth practical knowledge of windows in-securities and exploitation skills.

Get mentored by experts

Get mentor ship from expert and experienced ethical hackers, security researchers and penetration testers, who bring the industry perspective.

Earn yourself a certificate of achievement


  • Overview of Windows Security
  • Access Control Overview
  • Windows Security Principals
  • Windows Authentication
  • Auditing
  • NetBIOS Service Enumeration
  • RPC Enumeration
  • SMB Enumeration
  • Windows DNS Enumeration
  • SNMP Enumeration
  • Active Directory Enumeration
  • Windows Security Loopholes
  • Exploiting Windows Security Loopholes
  • Summary
  • Windows Rootkits
  • Changing Threat Environment
  • Windows Internals
  • Shadow Walker
  • Anti malware vs Rootkits
  • Rootkit Detection Tools & Techniques
  • Bit-locker Drive Encryption
  • Windows Integrity Controls
  • User Account Control
  • Windows Service Hardening
  • Password Breaking
  • Eavesdropping on Windows Authentication
  • Subverting Windows Authentication
  • Exploiting Windows Services
  • Transferring Attackers Toolkit for Further
  • Domination
  • Remote Interactive Control
  • Password Extraction
  • Password Cracking
  • Summary
  • MSSQL Security Concepts
  • Exploiting MSSQL Server
  • Critical Defensive Strategies
  • Report Writing
  • Summary

Additional Information

  • Penetration Testers & Ethical Hackers
  • Windows Systems Admins
  • Cyber Security Professionals
  • InfoSec Enthusiasts
  • Computer Science Students
  • Basic knowledge about windows system and command line.
  • NX/ASLR Bypass – Using different techniques to bypass Data Execution Prevention and Address Space Layout Randomization protection mechanisms on modern operating systems.
  • Function pointer overwrites – Overwriting a function pointer in order to get code execution.
  • Precision Heap Spraying – Spraying the heap for reliable code execution.
  • Disarming EMET Mitigations to gain reliable code execution
  • 64 and 32 Bit Windows Kernel Driver Exploitation
  • Kernel Pool Exploitation
  • Access to hackers guru cloud based labs.
  • Study Material & Course Slides.
  • Course Completion Certificate.
  • Job Assistance.
  • 10 Weeks

Fee Details

Training Fee: ₹20,000/-

Certification Exam Voucher: ₹9,999/-


Batch Start Dates

Batch Start Dates

04 May 2020


application deadline

03 May 2020

We follow a rolling admission process and admissions are closed once the requisite number of participants enroll for the upcoming batch. So, we encourage you to apply early and secure your seat.

I work as a web developer and was always attracted to cyber security. When hackers guru offered the cyber security certification, I decided to have it and get my career a future make over. The course is very crisp and in a short period of time they cover all the topics.

Rahul Bose

Web App Developer

My experience with this course is phenomenal, and all my expectation have been met. I liked the course very much, They have covered everything from the basics to the advanced. They have covered it all. I have no hesitation to give this course 4.5 starts out of 5.

Vedant Dutta

Engineering Student

Tap-tap, like, share, repeat

Join us on social media for latest news, career opportunities and offers.

Open chat
I'm Nikita Jain, How Can I Help You?